Pointer analysis

Results: 174



#Item
141Functions and mappings / Binary decision diagram / Boolean algebra / Model checking / Models of computation / Datalog / Data-flow analysis / Function / Scope / Mathematics / Mathematical logic / Diagrams

Cloning-Based Context-Sensitive Pointer Alias Analysis Using Binary Decision Diagrams John Whaley Monica S. Lam Computer Science Department Stanford University

Add to Reading List

Source URL: suif.stanford.edu

Language: English - Date: 2004-04-28 04:04:03
142Data types / C++ / Exec / POSIX / Process / Dynamic-link library / Open / Pointer / C / Computing / Computer programming / C POSIX library

Documentation of the BEMCmpMgr (CEC Compliance Manager) DLL For Analysis of Commercial Buildings SAC[removed]v8) (latest changes in Red font) The purpose of this document is to provide information needed to develop so

Add to Reading List

Source URL: bees.archenergy.com

Language: English - Date: 2014-05-13 19:25:53
143Software engineering / Numerical linear algebra / LAPACK / Basic Linear Algebra Subprograms / Fortran / EISPACK / Array programming / Pointer / C++ classes / Computing / Numerical software / Numerical analysis

New URL: http://www.R-project.org/conferences/DSC[removed]DSC 2001 Proceedings of the 2nd International Workshop on Distributed Statistical Computing March 15-17, Vienna, Austria http://www.ci.tuwien.ac.at/Conferences/DSC

Add to Reading List

Source URL: www.r-project.org

Language: English - Date: 2014-02-10 03:03:38
144Differential geometry / Visa / Derivative / Generalizations of the derivative / Pointer / Mathematical analysis / Mathematics / Differential calculus

CIS Update:  Practice Pointers PRESENTED BY GAIL PENDLETON & CECELIA FRIEDMAN LEVIN MODERATOR: SONIA PARRAS April 22, 2013

Add to Reading List

Source URL: www.asistahelp.org

Language: English - Date: 2013-04-22 13:00:01
145Cross-platform software / Software testing / Hacking / Vulnerability / C / Buffer overflow / Null / Pointer / Find / Computing / Software engineering / Computer programming

Analysis procedure overview The goals of analysis are: To collect various numbers for test cases and/or tool reports, e.g., numbers of true tool warnings by weakness category. To estimate tool overlap (to what degree do

Add to Reading List

Source URL: samate.nist.gov

Language: English - Date: 2013-05-07 16:56:14
146Computer programming / Primitive types / Type theory / Program analysis / Type system / Pointer / C / Integer / Comparison of programming languages / Data types / Computing / Software engineering

BCF2 Quick Reference In BCF2, a typed value consists of a typing byte and the actual value with type mandated by the typing byte. In the typing byte, the lowest four bits give the atomic type. If the number represented

Add to Reading List

Source URL: www.1000genomes.org

Language: English - Date: 2012-07-05 12:17:07
147Programming language theory / Type theory / Program analysis / Type system / Pointer / C / Data types / Computing / Software engineering

BCF2 Quick Reference (r198) In BCF2, each key in the FILTER, INFO and FORMAT fields is required to be defined in the VCF header. For each record, a key is stored as an integer which is the index of its first appearance

Add to Reading List

Source URL: samtools.github.io

Language: English - Date: 2014-09-12 06:54:45
148C++ / Object-oriented programming / C programming language / Software bugs / Pointer / C / Sizeof / Find / Dangling pointer / Computing / Computer programming / Software engineering

Detailed Case Analysis of Region Inconsistencies Zhilei Xu [removed] 1

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2013-09-16 03:49:12
149Software bugs / Address space layout randomization / PaX / Buffer overflow / Return-oriented programming / Malware / C / Stack / Pointer / Computing / Computer programming / Software engineering

Systematic Analysis of Defenses Against Return-Oriented Programming ⋆ R. Skowyra, K. Casteel, H. Okhravi, N. Zeldovich, and W. Streilein Boston University, MIT Lincoln Laboratory, and MIT CSAIL Abstract. Since the int

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
150Memory management / C Standard Library / Pointer / C programming language / C dynamic memory allocation / C / Sizeof / Buffer overflow / Heap overflow / Computing / Software engineering / Computer programming

Automated vulnerability analysis of zero sized heap allocations April 2010 Julien Vanegue ([removed]) Microsoft Security Engineering Center (MSEC)

Add to Reading List

Source URL: www.hackitoergosum.org

Language: English - Date: 2010-04-23 08:06:57
UPDATE